Carnegie Mellon University has received a five-year, $3 million grant from the National Science Foundation to launch a Ph.D. program in usable privacy and security...Carnegie Mellon News From ACM TechNews | August 27, 2009
Like a ghost ship, a rogue software program that glided onto the Internet last November has confounded the efforts of top security experts to eradicate the program...The New York Times From ACM News | August 27, 2009
Two programs created to get more minority and female students interested in STEM (science, technology, engineering and math) subjects and careers have received...The Journal From ACM TechNews | August 27, 2009
Robots that lend a very human-like helping hand to healthy elderly people with limited mobility may be on the horizon, thanks to three University of Illinois at...niversity of Illinois at Chicago From ACM News | August 27, 2009
The Information Products Laboratory for Emergency Response, a partnership between the Rochester Institute of Technology (RIT) and the University at Buffalo (UB)...Rochester Institute of Technology From ACM TechNews | August 26, 2009
A Worcester Polytechnic Institute (WPI) study by professor Craig Wills found that the practices of many popular social networking sites can make personal information...Worcester Polytechnic Institute From ACM TechNews | August 26, 2009
Governments in the Middle East and north Africa routinely block and censor Web sites to control political discussions, according to a new report on the region by...New Scientist From ACM TechNews | August 25, 2009
Scientists share knowledge and seek collaborators at computational sustainability conference.Karen A. Frenkel From Communications of the ACM | September 1, 2009
Researchers are addressing the computing challenges of older individuals, whose needs are different — and too often disregarded.Samuel Greengard From Communications of the ACM | September 1, 2009
Researchers working in medical nanorobotics are creating technologies that could lead to novel health-care applications, such as new ways of accessing areas of...Kirk L. Kroeker From Communications of the ACM | September 1, 2009
Female participation in the information technology (IT) industry is growing and women now account for 15 percent to 25 percent of technical professionals, although...Network World From ACM TechNews | August 25, 2009
The European Union-funded GridEcon project has developed a platform for trading computing resources and buying and selling standardized computing resources. GridEcon's...ICT Results From ACM TechNews | August 24, 2009
Canadian researchers have developed a robot capable of detecting tumor tissue in half the time it takes a human surgeon and with 40 percent greater accuracy while...EurekAlert From ACM TechNews | August 25, 2009
Opinions expressed on the Internet can determine the eventual success or failure of a product, and tools stemming from the emergent field of sentiment analysis...The New York Times From ACM TechNews | August 24, 2009
A new generation of Internet privacy tools is being developed to prevent governments from gathering data, such as where users access the Internet from. One tool...Reuters From ACM TechNews | August 24, 2009
U.S. government, industry, and academia are using cybersecurity competitions to interest high school and college students about the career opportunities in cybersecurity...Paul Hyman From ACM News | August 24, 2009
Students' performance in online education settings tended to trounce that of those receiving face-to-face instruction, according to a study SRI International carried...The New York Times From ACM TechNews | August 24, 2009
Yahoo! researchers are testing a scheme in which users pay one cent for each email message they send, with the money going to charity, in an effort to cut back...New Scientist From ACM TechNews | August 19, 2009
A study published in Proceedings of the National Academy of Sciences shows that friendships can be inferred with 95% accuracy by studying cellphone call records...BBC News From ACM TechNews | August 18, 2009
Russian hackers stole U.S. identities and software tools for use in a cyberattack against Georgian government Web sites during the war between Russia and Georgia...The Wall Street Journal From ACM TechNews | August 17, 2009